compliance

Results 1876 - 1900 of 2033Sort Results By: Published Date | Title | Company Name

Global Records Compliance: What You Need to Know

Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This IDC White Paper discusses the impact of the critical records management, data retention, and data protection regulations across key geographies. It concludes with recommendations for developing global information governance best practices.
Tags : 
hp + intel, idc, data retention, data protection regulations, records management, global records compliance, storage management, compliance, best practices, data protection, content management system, document management, information management, secure content management, content management
    
HP and Intel® Xeon® processors

The Growing Challenges of Compliance in a Mobile World

Published By: TextGuard Mobile     Published Date: Mar 10, 2011
The Growing Challenges of Compliance in a Mobile World White Paper by Osterman Research
Tags : 
mobile message archiving, monitoring, compliance, sms, text messages, bbm, instant messages, archiving, data protection
    
TextGuard Mobile

Automating IT Data Collection and Compliance for GRCM Controls

Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas, access control, compliance, network security appliance, security management, risk management, data protection, database security, software compliance, vulnerability management
    
Qualys

Delivering Videoconferencing to the Enterprise

Published By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : 
aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition, video-enabled, video-aided, it spending, return on investment, sales automation, video conferencing, virtualization
    
Aberdeen Group

Call Recording for Healthcare: Compliance Rules & Regulations for HIPAA, PCI and NACHA

Published By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : 
hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
    
dvsAnalytics

Affirmative Action Industry Profiles-Understanding Different Compliance Needs

Published By: Berkshire Associates     Published Date: May 09, 2011
Berkshire's white paper examines the different compliance needs in the Manufacturing, Healthcare, and Finance Industries
Tags : 
affirmative action, manufacturing, finance, health care, compliance, human resources, ofccp
    
Berkshire Associates

Fortifying the Pillars of IT Governance for Microsoft SharePoint Server 2010 Deployments

Published By: AvePoint     Published Date: May 11, 2011
This document is intended to aid IT administrators and other stakeholders responsible for managing Microsoft SharePoint deployments, in planning and implementing a comprehensive, reliable and efficient governance strategy
Tags : 
governance, sharepoint, infrastructure management, compliance, document management, migration, auditing, administration, business management, corporate governance, content delivery, corporate portals, information management
    
AvePoint

23 Reasons Why Companies Choose Integrated XBRL

Published By: IBM Business Analytics     Published Date: Jun 23, 2011
Companies globally must determine the approach to compliance with mandated use of XBRL and significantly accelerating financial reporting. Here are 23 reasons to why an integrated approach towards external reporting is required by organizations today.
Tags : 
ibm business analytics, integrated xbrl tagging, extensible business reporting language, bolt-on, tag once, taxonomy collaboration, validation, xhtml, business analytics, business intelligence, business management, business metrics, analytical applications, financial management
    
IBM Business Analytics

Eight Ways to Reduce PCI DSS Audit Scope by Tokenizing Cardholder Data

Published By: Liaison Technologies     Published Date: Jun 03, 2011
This paper explores the use of tokenization as a best practice in improving the security of credit card transactions, while at the same time minimizing the headaches and angst associated with PCI DSS compliance.
Tags : 
liaison, nubridges, gary palgon, dss audit scope, cardholder data, pci dss compliance, tokenization, tokens, taas, direct marketer, cissp, credit card transactions, auditing, compliance, encryption, identity management, network security appliance, password management, data protection, pci compliance
    
Liaison Technologies

Tokenization for Dummies

Published By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost, pii, ehr, data breach, data security, audits, encryption, key management, network security, auditing, identity management, network security appliance, password management
    
Liaison Technologies

Beyond compliance: A pragmatic guide to making the most of your PCI DSS initiatives

Published By: The Logic Group     Published Date: Jun 07, 2011
If you are a business that accepts credit or debit card payments then achieving PCI DSS compliance is an industry requirement. But how can you make it work for your business & prevent it becoming an exercise in box ticking?
Tags : 
pci dss, compliance, credit card data, debit card data, customer data, retail, payments
    
The Logic Group

The UK Bribery Act and Beyond - Preparing for Change

Published By: Global Compliance     Published Date: Jun 07, 2011
The UK Bribery Act and Beyond - Preparing for Change
Tags : 
compliance solutions, sexual harassment training, harassment training, ethics hotline
    
Global Compliance

An Executive's Guide to Cutting HR Costs

Published By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneur's will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance, compliance
    
TriNet

Top 5 HR Compliance Concerns for Small Business

Published By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : 
trinet, compliance, smb, small business, human resources, infrastructure, retirement, health, insurance, benefits, litigation, qualified guidance, payroll, legal, procedure
    
TriNet

Top 5 HR Compliance Concerns for Small Business

Published By: TriNet     Published Date: Sep 13, 2016
Top 5 HR Compliance Concerns for Small Business
Tags : 
trinet, compliance, human resources
    
TriNet

How Compliance Impacts Backup Strategy

Published By: Idera     Published Date: Jan 22, 2013
While most information can (at least in theory) be kept on paper, virtually all organizations now keep personnel, customer, financial, transactional and other records in digital format.
Tags : 
idera, compliance, backup strategy, industry regulations, six sigma, itil, disaster recovery plan
    
Idera

Delivering Videoconferencing to the Enterprise

Published By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : 
aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition, video-enabled, video-aided
    
Aberdeen Group

eBook: Implementing Electronic Lab Notebooks

Published By: Accelrys     Published Date: Feb 08, 2012
In this 18-page Scientific Computing eBook, Bennett Lass Ph.D. PMP shares best practices based on his experiences planning and managing ELN deployments in large and small pharmaceutical and biotechnology research organizations.
Tags : 
accelrys, eln, symyx, scientific computing, electronic lab notebook, electronic, notebooks, lass, eln deployments, pharmaceutical, pharm, biotech, biotechnology, research, compliance
    
Accelrys

Why a Fully-Virtualized SAN is more Cost Effective than Legacy NAS, SAN and DAS

Published By: Dell Storage     Published Date: Mar 06, 2012
By enabling organizations to centralize desktop deployment, a VDI can help simplify admin and reduce costs while enhancing security and regulatory compliance and increasing IT flexibility and business agility. Don't wait - find out more now.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure, vdi, convergence, network architecture, network performance, network performance management, business analytics, business integration, business intelligence, business management, project management, content management
    
Dell Storage

HIPAA Compliant Data Centers

Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure, patients, utmost, security, confidentiality, integrity, sensitive, information, compliant, compliance, practice, particular, emphasis
    
Dell Storage

PCI Compliant Data Centers

Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage

Top Trends in Workforce Management: Where Does Your Organization Stand?

Published By: Workforce Software     Published Date: Nov 17, 2011
During the past several years, challenges such as increased regulatory pressures, employee fatigue and the ever-present need to reduce costs have all weighed heavily on most human resource organizations. As a result, HR and payroll professionals are playing an increasingly strategic role in the day-to-day operation of the business.
Tags : 
workforce management software, labor laws, california labor laws, change management, labor law compliance, time and attendance, time and attendance software, labor scheduling, labor scheduling software, employee scheduling, absense management, absense management software, fatigue management, employee fatigue management, mobile workforce management, mobile time and attendance, mobile scheduling software, flsa, flsa compliance, fmla
    
Workforce Software

For regulated industries: Learning within a multi-tenant SaaS architecture

Published By: Success Factors     Published Date: Feb 06, 2014
Organizations in regulated industries struggle with adopting SaaS-based learning solutions because of specific documentation, record-keeping, and IT requirements that must be followed, and the need to comply with a range of Good Practice (GxP) requirements. With a cloud solution that supports GxP requirements, companies in regulated industries can address compliance challenges and deliver a validated environment with a cloud-based LMS.
Tags : 
good practice, gxp, learning management system, lms, cloud-based lms, saas-based learning solutions, human resources, e-learning, employee onboarding, human resource technology
    
Success Factors

Recognize the Many Faces of Fraud

Published By: IBM     Published Date: Jul 24, 2012
Detect and prevent fraud by finding subtle patterns and associations in your data. IBM SPSS predictive analytics solutions have proved to be very effective at helping tax collection agencies to maximize revenues by detecting non-compliance more efficiently and by focusing investigations on cases that are likely to yield the biggest tax adjustments.
Tags : 
fraud, business, healthcare, taxes, government, ibm, spss
    
IBM
Start   Previous    68 69 70 71 72 73 74 75 76 77 78 79 80 81 82    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.